scholarly journals D-Sense: An Integrated Environment for Algorithm Design and Protocol Implementation in Wireless Sensor Networks

Author(s):  
Kazushi Ikeda ◽  
Shunsuke Mori ◽  
Yuya Ota ◽  
Takaaki Umedu ◽  
Akihito Hiromori ◽  
...  
2014 ◽  
Vol 926-930 ◽  
pp. 3641-3644
Author(s):  
Bo He

Low-power wireless sensor networks (WSNs) design involves all aspects of research in wireless sensor networks. As energy is limited in wireless sensor networks, how to effectively manage and use energy of WSNs, and how to maximize the reduction of power consumption in WSNs and extend the lifetime of WSNs become a key problem faced by wireless sensor networks. Aimed at these problems, a low-power clustering routing algorithm based on load-balanced is proposed. The algorithm introduced an energy load factor to reduce the power consumption of WSNs. The simulation results show that the low-power routing algorithm can effectively reduce power consumption of networks and extend the lifetime of networks.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2718 ◽  
Author(s):  
Zhaowei Wang ◽  
Peng Zeng ◽  
Linghe Kong ◽  
Dong Li ◽  
Xi Jin

Time synchronization is critical for wireless sensors networks in industrial automation, e.g., event detection and process control of industrial plants and equipment need a common time reference. However, cyber-physical attacks are enormous threats causing synchronization protocols to fail. This paper studies the algorithm design and analysis in secure time synchronization for resource-constrained industrial wireless sensor networks under Sybil attacks, which cannot be well addressed by existing methods. A node-identification-based secure time synchronization (NiSTS) protocol is proposed. The main idea of this protocol is to utilize the timestamp correlation among different nodes and the uniqueness of a node’s clock skew to detect invalid information rather than isolating suspicious nodes. In the detection process, each node takes the relative skew with respect to its public neighbor as the basis to determine whether the information is reliable and to filter invalid information. The information filtering mechanism renders NiSTS resistant to Sybil attacks and message manipulation attacks. As a completely distributed protocol, NiSTS is not sensitive to the number of Sybil attackers. Extensive simulations were conducted to demonstrate the efficiency of NiSTS and compare it with existing protocols.


Sign in / Sign up

Export Citation Format

Share Document